Web Application Penetration Testing
By: Frank Coburn & Haris Mahboob
Web Application Penetration By: Frank Coburn & Haris Mahboob - - PowerPoint PPT Presentation
Web Application Penetration By: Frank Coburn & Haris Mahboob Testing Take Aways Overview of the web Web proxy tool Reporting Gaps in the process app penetration testing process Penetration testing vs vulnerability assessment What
By: Frank Coburn & Haris Mahboob
Take Aways
Overview of the web app penetration testing process Web proxy tool Reporting Gaps in the process
§ Penetration testing vs vulnerability
assessment
§ Finding security issues, exploiting them,
and reporting on it
FINDING VULNERABILITIES BEFORE THE BAD GUYS DO UNDERSTANDING THE APPLICATION SECURITY POSTURE LEGAL REQUIREMENTS (E.G PCI COMPLIANCE)
§ Requirements for testing § Effort days § Software/hardware requirements § Whitelisting § Testing window § Special requests § Cost
Our Methodology
Information gathering Developing test cases Vulnerability discovery & exploitation Risk analysis Reporting Providing support
enumeration *** Stakeholders need to be notified about public exposures and unauthenticated vulnerabilities right away! ***
A WordPress site running version 4.7.0 was vulnerable to Content Injection leading to an embarrassing and potentially reputation impacting message from a script kiddie.
Acting on Information Gathered
Application walkthrough
Discover the app’s functionality by investigating using your browser first See how much can be found without authentication. Look for common URLs, directories, and error pages
Fingerprinting
What JS framework are they using? Sometimes session cookie names give away the underlying platform: "JSESSIONID", "ASP.NetSessionID"
Analyze
Maybe you have some experience writing code in these languages Think about how you would implement this functionality, assumptions made, corners cut, etc Challenge what the developer’s assumptions in your testing
Developing Test Cases
Breaking components
issues:
authorization issues
Developing Business logic test cases:
controls
Google everything Improvising as the test proceeds Observing application behavior Carrying out the test cases
uhttps://www.kisspng.com/png-owasp-top-10-web-application-
security-computer-sec-4965837/
Impact of a successful attack
Likelihood of a successful attack
Security issue description Evidence Impact/Likelihood
Recommendations Presentation Support
§ Burp Suite Pro: § Proxy HTTP traffic § Allows modification of URL parameters
and HTTP request body
§ Useful for business logic testing § Easy searching of information sent or
received
ASSESSMENTS ARE TIMEBOXED LIMITED TO THE TESTER’S TECHNICAL ABILITIES TEST ENVIRONMENT MISREPRESENTATION NARROW SCOPES ATTACK SURFACE LIMITATIONS
Questions?